Internet protocol security decryption with secondary use speculative interrupts
a technology of speculative interrupts and network protocols, applied in the field of encrypted networks, can solve problems such as reducing the throughput of the system, requiring the execution of numerous cpu cycles, and requiring the latency of received data
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
example 1
Determination of Average Interrupt Handler Latency
[0027]Decryption engines process data at a rate of approximately 600 Megabits per second (“Mbit / sec”). The latency from the device Interrupt Request line (“IRQ”) to interrupt processing is based on measurements on INTEL PENTIUM III Processor and INTEL PENTIUM 4 Processor systems using a MICROSOFT WINDOWS 2000 Operating System. Notably, the value of this latency does not change significantly with processor speed.
[0028]The latency effect on TCP peak throughput is based on the bandwidth-delay product. Thus, maximum TCP throughput is the quotient of the receiver's window size divided by round trip time. The round trip time for a connection can be estimated from the latency values in Table 1; the latency values being doubled to account for the return of an acknowledgement. Assuming few or no infrastructure delays, and a 64K byte receiver's window (largest currently allowed without window scaling), the maximum throughput is estimated.
[0029...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


